chore: Update discovery artifacts (#1410)
## Deleted keys were detected in the following stable discovery artifacts:
managedidentities v1 https://github.com/googleapis/google-api-python-client/commit/e96adbb1ba3e4e56d916cc28474f85543f17ad0e
## Discovery Artifact Change Summary:
feat(appengine): update the api https://github.com/googleapis/google-api-python-client/commit/ffcf86035a751e98a763c8a2d54b70d3a55ca14d
feat(containeranalysis): update the api https://github.com/googleapis/google-api-python-client/commit/9a1c70b7df3e074fc9fbd0eebdaf75a91046078c
feat(documentai): update the api https://github.com/googleapis/google-api-python-client/commit/07a6e774ac185442a99437896eaee774946b5846
feat(drive): update the api https://github.com/googleapis/google-api-python-client/commit/773910fdf25b084aa3623d24fe99c8a1330fbecb
feat(managedidentities): update the api https://github.com/googleapis/google-api-python-client/commit/e96adbb1ba3e4e56d916cc28474f85543f17ad0e
feat(spanner): update the api https://github.com/googleapis/google-api-python-client/commit/87da2f3605ec1b8986324cddc33f2b5601d3e896
diff --git a/docs/dyn/containeranalysis_v1alpha1.projects.occurrences.html b/docs/dyn/containeranalysis_v1alpha1.projects.occurrences.html
index ced5fc2..1cd4cf8 100644
--- a/docs/dyn/containeranalysis_v1alpha1.projects.occurrences.html
+++ b/docs/dyn/containeranalysis_v1alpha1.projects.occurrences.html
@@ -271,6 +271,16 @@
},
"provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
+ "compliance": { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
+ "nonComplianceReason": "A String", # The reason for non compliance of these files.
+ "nonCompliantFiles": [ # A list of files which are violating compliance checks.
+ { # Details about files that caused a compliance check to fail.
+ "displayCommand": "A String", # Command to display the non-compliant files.
+ "path": "A String", # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.
+ "reason": "A String", # Explains why a file is non compliant for a CIS check.
+ },
+ ],
+ },
"createTime": "A String", # Output only. The time this `Occurrence` was created.
"deployment": { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
"address": "A String", # Address of the runtime element hosting this deployment.
@@ -571,6 +581,16 @@
},
"provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
+ "compliance": { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
+ "nonComplianceReason": "A String", # The reason for non compliance of these files.
+ "nonCompliantFiles": [ # A list of files which are violating compliance checks.
+ { # Details about files that caused a compliance check to fail.
+ "displayCommand": "A String", # Command to display the non-compliant files.
+ "path": "A String", # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.
+ "reason": "A String", # Explains why a file is non compliant for a CIS check.
+ },
+ ],
+ },
"createTime": "A String", # Output only. The time this `Occurrence` was created.
"deployment": { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
"address": "A String", # Address of the runtime element hosting this deployment.
@@ -895,6 +915,16 @@
},
"provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
+ "compliance": { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
+ "nonComplianceReason": "A String", # The reason for non compliance of these files.
+ "nonCompliantFiles": [ # A list of files which are violating compliance checks.
+ { # Details about files that caused a compliance check to fail.
+ "displayCommand": "A String", # Command to display the non-compliant files.
+ "path": "A String", # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.
+ "reason": "A String", # Explains why a file is non compliant for a CIS check.
+ },
+ ],
+ },
"createTime": "A String", # Output only. The time this `Occurrence` was created.
"deployment": { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
"address": "A String", # Address of the runtime element hosting this deployment.
@@ -1123,6 +1153,23 @@
"signature": "A String", # Signature of the related `BuildProvenance`, encoded in a base64 string.
},
},
+ "compliance": { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
+ "cisBenchmark": { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
+ "profileLevel": 42, # The profile level of this CIS benchmark check.
+ "severity": "A String", # The severity level of this CIS benchmark check.
+ },
+ "description": "A String", # A description about this compliance check.
+ "rationale": "A String", # A rationale for the existence of this compliance check.
+ "remediation": "A String", # A description of remediation steps if the compliance check fails.
+ "scanInstructions": "A String", # Serialized scan instructions with a predefined format.
+ "title": "A String", # The title that identifies this compliance check.
+ "version": [ # The OS and config versions the benchmark applies to.
+ { # Describes the CIS benchmark version that is applicable to a given OS and os version.
+ "cpeUri": "A String", # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
+ "version": "A String", # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
+ },
+ ],
+ },
"createTime": "A String", # Output only. The time this note was created. This field can be used as a filter in list requests.
"deployable": { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
"resourceUri": [ # Resource URI for the artifact being deployed.
@@ -1270,6 +1317,7 @@
DISCOVERY - The note and occurrence track the initial discovery status of a resource.
ATTESTATION_AUTHORITY - This represents a logical "role" that can attest to artifacts.
UPGRADE - This represents an available software upgrade.
+ COMPLIANCE - This represents a compliance check that can be applied to a resource.
name: string, The name field contains the project Id. For example: "projects/{project_id} @Deprecated
pageSize: integer, Number of occurrences to return in the list.
pageToken: string, Token to provide to skip to a particular spot in the list.
@@ -1430,6 +1478,16 @@
},
"provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
+ "compliance": { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
+ "nonComplianceReason": "A String", # The reason for non compliance of these files.
+ "nonCompliantFiles": [ # A list of files which are violating compliance checks.
+ { # Details about files that caused a compliance check to fail.
+ "displayCommand": "A String", # Command to display the non-compliant files.
+ "path": "A String", # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.
+ "reason": "A String", # Explains why a file is non compliant for a CIS check.
+ },
+ ],
+ },
"createTime": "A String", # Output only. The time this `Occurrence` was created.
"deployment": { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
"address": "A String", # Address of the runtime element hosting this deployment.
@@ -1747,6 +1805,16 @@
},
"provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
+ "compliance": { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
+ "nonComplianceReason": "A String", # The reason for non compliance of these files.
+ "nonCompliantFiles": [ # A list of files which are violating compliance checks.
+ { # Details about files that caused a compliance check to fail.
+ "displayCommand": "A String", # Command to display the non-compliant files.
+ "path": "A String", # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.
+ "reason": "A String", # Explains why a file is non compliant for a CIS check.
+ },
+ ],
+ },
"createTime": "A String", # Output only. The time this `Occurrence` was created.
"deployment": { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
"address": "A String", # Address of the runtime element hosting this deployment.
@@ -2047,6 +2115,16 @@
},
"provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
+ "compliance": { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
+ "nonComplianceReason": "A String", # The reason for non compliance of these files.
+ "nonCompliantFiles": [ # A list of files which are violating compliance checks.
+ { # Details about files that caused a compliance check to fail.
+ "displayCommand": "A String", # Command to display the non-compliant files.
+ "path": "A String", # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.
+ "reason": "A String", # Explains why a file is non compliant for a CIS check.
+ },
+ ],
+ },
"createTime": "A String", # Output only. The time this `Occurrence` was created.
"deployment": { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
"address": "A String", # Address of the runtime element hosting this deployment.